Viral shaming or (shaming, online shaming, public shaming) is a form of cyberbullying involving the public exposure and ridicule of individuals through widespread sharing in social media, typically for behavior which is seen as deviant.
Advances in technological communication have dramatically changed the ways in which social norm enforcement is used to constrain behavior. Viral shaming involves the intentional collection and dissemination of data that are potentially stigmatizing in modes that are widely accessible and in which observers (including members of the public) can often add input.
Shaming has ancient roots, with accounts in the revered writings and holy books of many societies and religions, including those of Charles Dickens and Seneca.
A common feature of online shaming is public humiliation. A challenge is to differentiate between a humbling (rightly knocking someone down a peg for a social transgression) and a humiliation that is an affront to dignity (wrongly knocking someone down a peg). In addition, the privacy concern of shamed individuals is not necessarily about intrusion on seclusion or revelation of embarrassing information, but rather about the disruption in their ability to continue to participate in online spaces free from attack.
In recent years, viral online shaming has cost companies millions, candidates elections, and individuals their careers overnight.
Viral shaming
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
CyberCash Inc. was founded in 1994 and is performing secure credit card presentations since April 1995. CyberCash provides a range of commer...
-
Doxxing is the word coined to describe the process of releasing of personally identifying information to the public without their consent. ...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
-
An international team of researchers from Switzerland, the United Kingdom, and Canada has identified the gene responsible for a rare but life-threatening...
-
Adenosine diphosphate (ADP) is a key molecule in cellular energy regulation, consisting of adenosine and two phosphate groups. It is central to the cell's ...